It is VERY important that you work with the Evernote application on your macbook
open the finder or your hard drive (Macintosh HD)
select applications
find the Evernote icon (green and black elephant)
select the icon and launch the Evernote application
you will need to sign in to your account with you user name and password
(the application may give you a warning - ignore it and it may need to install additional
software - that is ok too - if the additional software will not install please tell your
facilitator so that it can be updated at a later time - it should not keep you from
using Evernote at this time.
Working with Evernote
If you have an iPhone or iPod touch you can use the Evernote app
Evernote 3.0 for iphone from Scott Lewis on Vimeo.
It is VERY important that you work with the Evernote application on your macbook
- open the finder or your hard drive (Macintosh HD)
- select applications
- find the Evernote icon (green and black elephant)
- select the icon and launch the Evernote application
you will need to sign in to your account with you user name and password(the application may give you a warning - ignore it and it may need to install additional
software - that is ok too - if the additional software will not install please tell your
facilitator so that it can be updated at a later time - it should not keep you from
using Evernote at this time.
After you have launched Evernote you will be give approximately 45 minutes to conduct research for your Cyber Safety project
Use only the Following Resources (do not just Google it):
Identity Theft:
Play Antiphishing Phil
http://cups.cs.cmu.edu/antiphishing_phil/new/index.html
Learn what it is:
http://www.commoncraft.com/phishing
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html
Protect yourself:
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html
http://tcs.cybertipline.com/knowthedangers8.htm
Online Bullying:
Learn what it is (almost everything needed is here):
http://www.stopcyberbullying.org/index2.html
NEWS:
(pay special attention to the last paragraph of this one)
http://news.cnet.com/When-cyberbullying-hits-teens/2010-1030_3-6201365.html
Protect yourself:
Video: http://www.netsmartz.org/stories/angela.htm
http://www.thisisnottingham.co.uk/news/Post-Comment-Old-fashioned-action-online-bullies/article-1105966-detail/article.html
Protect yourself (other fixes):
http://gaetc-ejournal.org/instruction/cyberbullies/cyberbully.htm
http://www.safetyclicks.com/2008/11/13/what-can-you-do-if-your-child-is-bullied-online/
File Piracy and Illegal Downloading
What is it? http://www.it.northwestern.edu/security/illegaldownloading/index.html
http://www.stfrancis.edu/content/cid/copyrightbay/bg001.htm
http://www.stfrancis.edu/content/cid/copyrightbay/av1.htm
NEWS:
http://media.www.westerncourier.com/media/storage/paper650/news/2006/10/02/News/Illegal.Downloading.May.Cost.Jobs-2320050.shtml
http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article3353387.ece
http://www.eschoolnews.com/news/top-news/news-by-subject/litigation/index.cfm?i=59977
Protect yourself (other fixes): http://creativecommons.org/about/what-is-cc
Safe Social Networking
What it is:
http://www.commoncraft.com/video-social-networking
http://news.cnet.com/When-cyberbullying-hits-teens/2010-1030_3-6201365.html
News:
http://www.wired.com/culture/education/news/2007/04/myspaceforschool
http://www.pbs.org/teachers/learning.now/2008/07/pbs_teachers_embraces_social_n_1.html
Protect yourself:
http://tcs.cybertipline.com/knowthedangers.htm
http://www.wiredsafety.org/safety/chat_safety/phone_safety/sms7.html
Filtering Bad Content
What it is (schools have to abide by CIPA and COPA):
[[en.wikipedia.org/wiki/Children%27s_Internet_Protection_Act]]
www.ala.org/ala/aboutala/offices/oif/ifissues/issuesrelatedlinks/cppacopacipa.cfm
News:
[[news.yahoo.com/s/afp/20090813/wl_asia_afp/chinaitcomputerinternetcensor]]
www.articlesbase.com/internet-articles/growing-use-of-internet-filter-software-420166.html
Protect Yourself (all free):
http://kids.getnetwise.org/trouble/
www1.k9webprotection.com/
www.opendns.com/solutions/homenetwork/
Parental Controls in Vista: www.microsoft.com/windows/windows-vista/features/parental-controls.aspx
Parental Controls in Mac OSX: http://support.apple.com/kb/HT2900
School AUPs
What it is: (For this section there is no "protect yourself" slide, do two slides on Chawanakee's AUP, list ten things kids should know)
http://www.education-world.com/a_curr/curr093.shtml
http://www.usdoj.gov/criminal/cybercrime/rules/acceptableUsePolicy.htm
News:
http://www.eschoolnews.com/news/top-news/index.cfm?i=54654
http://news.cnet.com/8301-19518_3-10280411-238.html
Chawanakee's Student AUP
http://www.chawanakee.k12.ca.us/district/human_resources/Documents/STUDENT%20INTERNET%20AUP%20081106.pdf
Cyberpredators
Play ID the Creep:http://www.idthecreep.com/
What they are:
http://www.unh.edu/ccrc/
http://www.wiredsafety.org/internet101/aromance.html
http://tcs.cybertipline.com/knowthedangers1.htm
News:
http://www.khnl.com/global/story.asp?S=6014430
http://www.abc.net.au/news/stories/2006/04/26/1624526.htm
http://www.carrollcountycomet.com/news/2006/0111/Front_Page/006.html
Protect yourself:
http://www.missingkids.com/adcouncil/talk.html
http://www.safeteens.com/2009/02/11/predator-panic-a-risky-distraction/